• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

13 Major Vulnerabilities Discovered in AMD Zen Architecture, Including Backdoors

This story was published with no concrete background evidence and CTS LAB a company that just appeared out of no where back in 2017. This all seems like a targeted campaign just when AMD is gaining ground in CPU market. Besides you need Admin access to the system itself, with that kind of access any system is vulnerable.
 
It will be interesting to see how this turns out. Point of note: Intel is threatened by AMD's recent advances; however, if these turn out to be as BS as they smell right now, Intel should beware gamers with pitchforks.
 
"So, if any of those exploits are real... you still need admin privileges?

If a malicious actor has already gotten their hands on admin privileges, wouldn't you have bigger problems to worry about?"
The problem would be that you might not even know you've been compromised, since these exploits are (supposedly) undetectable by any current antivirus software. Even if you suspected that someone had accessed your machine, a scan would show no problems. Of course, that may change soon, as more becomes known.
 
they had this website built, videos made, diagrams made and charts with whitepapers made in 48 hours? i think they set up amd to tell them then 24hours later they slam the media on them.... 100% a setup
 
If a BIOS is re-written, I do believe it resets back to default basic settings. It seems I will keep an eye on this if my computer somehow defaults back for no reason. Please correct me if I am wrong here.
That doesn't always happen as it is triggered by a flag in the update process. If that flag is not set, the settings are not reset to defaults.

Lots of people are renting full servers, not just virtual machines. Yes I can flash the BIOS of our webservers
Holy crap! You'd think something like that would be locked down..
 
You have never run GPU-Z ? It starts with admin privileges and comes with a signed driver

No, not in production environment. Not on anything remotely important enough.

If this issue/attack vector is possible only via Windows OS and elevated administrator privileges are required AND the BIOS flash requires signed UEFI package then for all i can find currently you'd be screwed without any exploit. The user who has such access and tools available to them can take anything in the system without your knowledge. Full system access required to exploit? LOL
 
:laugh: Those guys at CTS Labs are adware developers: ^^ CTS-Labs turns out to be the company that produced the CrowdCores Adware ^^
 
If true, it would give them a bit of credibility as they obviously know how to take advantage of vulnerabilities. Who better to find vulnerabilities than actual hackers/crackers?
Adware are mostly browser toolbars/plugins that install silently with the utility you previously trusted but the company got bought :)
No clue about TPU.
There's your clue: https://www.techpowerup.com/forums/...cture-including-backdoors.242328/post-3812761
 
Ok, good point. So TPU has it's own servers now? Most sites are hosted.
We've had our own (rented) servers for at least a decade now, at various hosting companies. If you are curious and want to know more, open a new thread or send me a pm.
 
We've had our own (rented) servers for at least a decade now, at various hosting companies. If you are curious and want to know more, open a new thread or send me a pm.

W1zzard, what is your take on credibility of CTS Labs?
 
Low quality post by Nihilus
Wow TPU seems to be the bottom of the barrel for tech sites. Other sites like gamersnexus and techspot have already revealed all of the BS or at least suspect nature of this. You guys would rather keep the click bait.

Wizard, butnr - do some dame journalism!
 
W1zzard, what is your take on credibility of CTS Labs?
They don't have any. They're a newly established group that handled this terribly.
Their credibility, however, is of little importance.
 
W1zzard, what is your take on credibility of CTS Labs?
Based on what he's said already, my guess is that he is likely dubious of the company itself but takes the vulnerabilities seriously, which is wise. That happens to be my position as well. CTS may be shady as hell, but the threats must be taken seriously until either proven invalid or verified and fixed.
 
Based on what he's said already, my guess is that he is likely dubious of the company itself but takes the vulnerabilities seriously, which is wise. That happens to be my position as well. CTS may be shady as hell, but the threats must be taken seriously until either proven invalid or verified and fixed.

Same here, but if this is proved to be by Intel's hand... Man they would be the lowest. "Performance over price and any kind of integrity!"
 
Same here, but if this is proved to be by Intel's hand... Man they would be the lowest. "Performance over price and any kind of integrity!"
I'm not buying that. Even if true, should the vulnerabilities be real, they're real and need to be addressed regardless of the motives and methods of discovery.
 
Yeah, I want a fast response from AMD, backstab or not, they have to fix this, or confirm that it's a fraud, whatever the truth may be.
 
This absolutely REEKS like a group of Intel insiders that hatched a plan to short AMD shares after the big "meltdown/spectre" scare last June.

Geeks don't always make the best criminals though....
 
Why do these exploits have such kickass names?
 
sadly, but we live in "alternative facts" age where PObox companies (that did not exist few months ago) with shutter stock photo/video backgrounds can make such a noise in a split second and weather that PObox company will exists after few weeks or not - that does not matter - damage (to multibillion company) will be done for next few Quartals to come.
 
Back
Top